2019/05/02 20:42:46 fuzzer started 2019/05/02 20:42:46 dialing manager at 127.0.0.1:46825 2019/05/02 20:42:46 syscalls: 212 2019/05/02 20:42:46 code coverage: support is not implemented in syzkaller 2019/05/02 20:42:46 comparison tracing: support is not implemented in syzkaller 2019/05/02 20:42:46 extra coverage: support is not implemented in syzkaller 2019/05/02 20:42:46 setuid sandbox: support is not implemented in syzkaller 2019/05/02 20:42:46 namespace sandbox: support is not implemented in syzkaller 2019/05/02 20:42:46 Android sandbox: support is not implemented in syzkaller 2019/05/02 20:42:46 fault injection: support is not implemented in syzkaller 2019/05/02 20:42:46 leak checking: support is not implemented in syzkaller 2019/05/02 20:42:46 net packet injection: support is not implemented in syzkaller 2019/05/02 20:42:46 net device setup: support is not implemented in syzkaller 20:42:46 executing program 0: r0 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/args\x00', 0x10, 0x3, 0x0) r1 = openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) fchdir(0x0, r1) fd2path(r0, &(0x7f0000000080)=""/105, 0x69) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) fd2path(r1, &(0x7f0000000140)=""/43, 0x2b) r2 = openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) r3 = openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f00000001c0)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x8, 0x120) vmm_ctl$VMM_CTL_SET_FLAGS(0x4, 0x2) abort_sysc_fd(r3) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/wait\x00', 0x10, 0x1, 0x0) close(r1) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000280)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/random\x00', 0xc, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f00000003c0)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x8, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000480)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000640)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) 20:42:46 executing program 1: openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000180)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000300)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000380)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f00000004c0)='/prof/kptrace\x00', 0xe, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000540)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000580)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000740)='/net/udp/stats\x00', 0xf, 0x1, 0x0) 20:42:46 executing program 3: openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x1, 0x0) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000280)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f00000002c0)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f00000005c0)='/net/log\x00', 0x9, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) close(r0) 20:42:46 executing program 2: r0 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) r1 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) r2 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) fd2path(r2, &(0x7f0000000100)=""/122, 0x7a) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0xa, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x2010, r1, 0x1) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) r3 = openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) tcgetattr(r1, &(0x7f0000000280)) r4 = openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) fstat(r0, &(0x7f0000000300)) r5 = openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) llseek(r3, 0x8, 0xff, &(0x7f00000003c0), 0x1) r6 = openat$dev_user(0xffffffffffffff9c, &(0x7f0000000400)='/dev/user\x00', 0xa, 0x3, 0x0) r7 = openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) r8 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) pop_ctx(&(0x7f00000004c0)="01c00349bf35ce3bc29f0984c89207790a315ccd178d3e8e2203c705baebe3793379a550059c73182ed8b2146a351a7b74dc664af7f6ba63640465547ab1b9b6f682089202f3c0f71f905a59cc16a670973f511088081e13c4ec7467a990fadc4b072e4efb15082a591bc72dc7a74bcab3be4dfc67f84db6d9bbc92126efcec4a3fefe600d3f10ec13a468b5a0b915c7d5334f6f9d5c01db2690ea759f0fae07ed437ef810a1be6341d84ddf891e6fb64e8debc92ef30249924180f9454f9dbe86bdff49620e49dd5218e14b32c531430d60c8235da22566") llseek(r7, 0x3f, 0xa5, &(0x7f00000005c0), 0x2) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000600)='/net/ndb\x00', 0x9, 0x3, 0x0) r9 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) r10 = openat$dev_time(0xffffffffffffff9c, &(0x7f0000000680)='/dev/time\x00', 0xa, 0x3, 0x0) r11 = proc_create(&(0x7f00000006c0)='./file0\x00', 0x8, &(0x7f0000000700)='/net/tcp/2/status\x00', 0x12, 0x1) dup_fds_to(r11, &(0x7f0000000740)=[{r5}, {r1}, {r10}, {r10}, {r8}, {r6}, {r10}, {r9}, {r4}], 0x9) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f00000007c0)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ppid\x00', 0xa, 0x1, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000880)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f00000008c0)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) 20:42:46 executing program 4: r0 = openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000000)='/dev/.empty\x00', 0xc, 0x3, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x40, 0x2) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000080)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) r2 = openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) r3 = openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) r4 = openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) r5 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) nmount(r1, &(0x7f00000002c0)='./file0\x00', 0x8, 0x10) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000300)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) change_vcore(0x5, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) openat$proc_self_text(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/text\x00', 0x10, 0x1, 0x0) r6 = proc_create(&(0x7f0000000400)='./file0\x00', 0x8, &(0x7f0000000440)='&-:{\x00', 0x5, 0x0) provision(r6, 0x0, 0x6) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) tap_fds(&(0x7f00000007c0)=[{r0, 0x3, 0x2, 0xff, &(0x7f0000000540)={&(0x7f00000004c0)="9cf9bc7ae7eb9e5ae3691db2ddf9e34a60eacda4d0f49c59e87008d86f0709ffae250450832c072acf9864ba1fb6d611c01ef3811b6e94f7f6abb6c87a70dbf12f717d7c6eceb893a684f7a6f084229f", 0x5, 0x0, 0x7f, 0x4, 0x8}}, {r4, 0x2, 0x1, 0xfff, &(0x7f0000000600)={&(0x7f0000000580)="6b361f69dca6b81d2bdfc1d54cf0c1177e22b8846c879efbf4814176bfda83108920519ed02533b523d878b3aa0d79d4aecd999f6cdbf59f8bce13bd17e3b778073962dd36f689587b81ca1c8a58b532", 0x0, 0x0, 0x7d9, 0x4d, 0x400}}, {r2, 0x3, 0x100, 0x5, &(0x7f00000006c0)={&(0x7f0000000640)="6c077b3f93a3c6410f01a5f2ad07d600d73e811da4facc9543da4d86739078b02d92d3882000388fcfe1150a2f8a80cecf353b56ca0b427fe032506309a75cc8fc51ed98541b1b415089409d1ffac5df", 0xfff, 0x0, 0x7fff, 0x3, 0x80}}, {r2, 0x3, 0x4, 0x41, &(0x7f0000000780)={&(0x7f0000000700)="4fdf006d983dcc12a000eeead1da6cddc189627d222673301136056419de0b2bb53e5c4c5a118ffb22944572da768e993d1f5be25440c2eaaeba7e282aa5f4de93d01f1dae3ad87b56c7c1419104b051", 0x791d, 0x0, 0x8000, 0x9, 0x3207}}], 0x4) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000840)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) rename(&(0x7f0000000880)='./file0\x00', 0x8, &(0x7f00000008c0)='./file0\x00', 0x8) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000900)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/profile\x00', 0x13, 0x1, 0x0) write(r5, &(0x7f0000000980)="83c8d46719c04ecfc536c714d1552e1c69b273b254865295b1f249a7d43f5dd3e1cdc290a091a0c0fb7d4ca24a9bcea270487357ca38aa056f43b19c44e5e292fbc00aa8f51209a065f85cb73919b740c7b570c2c3ad1c5c18e6cd03553c03c5861b8c3585440537fd8bf325d59b0b35c985a35285e9986298072362275016936db0ea46d6ac2460b83dee91305f684d493b955530e675c917f853b0c21a85dc62cdc2212ad456ee8091c5fb1b7569c61b7bab037190abcfc11534c240aa179406dd018ec6f66c054954fecc33f861fae157092527b6454922d8f3c6dc0a656f100a7b59194f732e73b9a6e17b162c", 0xef) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000a80)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) read(r3, &(0x7f0000000b00)=""/167, 0xa7) 20:42:46 executing program 5: cache_invalidate() readlink(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)=""/247, 0xf7) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sdctl\x00', 0xb, 0x3, 0x0) symlink(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8) readlink(&(0x7f0000000200)='./file0\x00', 0x8, &(0x7f0000000240)=""/28, 0x1c) nunmount(&(0x7f0000000280)='./file0\x00', 0x8, &(0x7f00000002c0)='./file0\x00', 0x8) nunmount(&(0x7f0000000300)='./file1\x00', 0x8, &(0x7f0000000340)='./file0\x00', 0x8) proc_yield(0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) r0 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) proc_yield(0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000400)='/net/iprouter\x00', 0xe, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r1 = openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000480)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) r2 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) write(r1, &(0x7f0000000500)="a2ce789cfc3823a993e18b74e8adb8183a9e6db442f6c4147cf034a34762e5a270b4458a5d52d336809b11c5bae848b63a7f0fee98539958010d8d26f04cc1", 0x3f) r3 = proc_create(&(0x7f0000000540)='./file0\x00', 0x8, &(0x7f0000000580)=')\xfb\x00', 0x3, 0x1) proc_destroy(r3, 0x8) rmdir(&(0x7f00000005c0)='./file1\x00', 0x8) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipselftab\x00', 0xf, 0x1, 0x0) r4 = openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) write(r4, &(0x7f00000006c0)="df622f3fcc394cff09d12ac62545177f09c27529608f6fb4ae8e5b6b648a45dd733614655839bfeeb777ed98978bf2ba3493eee81b5a83ee4b32e2a7d446678208d360235d4c3832ee09e1df5b5dfab4ab8b76f835a65794305e6a1951a38633059d9e8ca7f029ea61aa26c10b088d61", 0x70) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000800)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) llseek(r2, 0x3f, 0x7, &(0x7f0000000840), 0x1) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000880)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) 20:42:46 executing program 6: vmm_ctl$VMM_CTL_GET_FLAGS(0x3) r0 = openat$dev_pgrpid(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x1, 0x0) r1 = openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bintime\x00', 0xd, 0x3, 0x0) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) fcntl$F_SETFD(r1, 0x2, 0x1) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/killkid\x00', 0xd, 0x3, 0x0) r2 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/killkid\x00', 0xd, 0x3, 0x0) r3 = proc_create(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)='/dev/bintime\x00', 0xd, 0x0) waitpid(r3, &(0x7f0000000180), 0x1) abort_sysc_fd(r1) provision(r3, 0x0, 0x9) r4 = fcntl$F_DUPFD(r0, 0x0, r2, 0x0) provision(r3, 0x0, 0xfffffffffffffff7) fcntl$F_GETFD(r4, 0x1) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) fcntl$F_SETFL(r2, 0x4, 0x0) getvcoreid() openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000300)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000380)='/dev/user\x00', 0xa, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sysname\x00', 0xd, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) 20:42:46 executing program 7: r0 = proc_create(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='\x00', 0x1, 0x1) proc_run(r0) r1 = proc_create(&(0x7f0000000080)='./file1\x00', 0x8, &(0x7f00000000c0)='{\x00', 0x2, 0x1) rename(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)='./file1\x00', 0x8) symlink(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file1\x00', 0x8) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) rmdir(&(0x7f0000000280)='./file0\x00', 0x8) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f00000002c0)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) unlink(&(0x7f0000000300)='./file1\x00', 0x8) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/clone\x00', 0xf, 0x3, 0x0) rmdir(&(0x7f00000003c0)='./file1\x00', 0x8) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) halt_core(0x1f) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sysstat\x00', 0xd, 0x3, 0x0) access(&(0x7f00000004c0)='./file0\x00', 0x8, 0x80) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000540)='/net/iprouter\x00', 0xe, 0x3, 0x0) proc_run(0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000600)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) chdir(r1, &(0x7f0000000640)='./file1\x00', 0x8) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000740)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) 20:42:47 executing program 0: openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) access(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff2e, 0x8000000112) access(&(0x7f0000000080)='./file1\x00', 0x8, 0x5) 20:42:48 executing program 0: r0 = openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000000)='/prof/kptrace\x00', 0xe, 0x3, 0x0) r1 = openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kmesg\x00', 0xb, 0x1, 0x0) r2 = proc_create(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='/dev/kmesg\x00', 0xb, 0x1) dup_fds_to(r2, &(0x7f0000000100)=[{r1}, {r0}, {r1}, {r1}], 0x4) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) waitpid(r2, &(0x7f0000000180), 0x1) waitpid(r2, &(0x7f00000001c0), 0x2) r3 = openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000200)='/prof/kptrace\x00', 0xe, 0x3, 0x0) halt_core(0x7fff) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000280)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) fwstat(r1, &(0x7f00000002c0)=""/206, 0xce, 0x0) read(r3, &(0x7f00000003c0), 0x0) openat(r3, &(0x7f0000000400)='./file0\x00', 0x8, 0x100202, 0xa) proc_run(r2) r4 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sdctl\x00', 0xb, 0x3, 0x0) getvcoreid() fchdir(0xffffffffffffffff, r3) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/stats\x00', 0xf, 0x1, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x8, 0x180) pop_ctx(&(0x7f0000000500)="0af382b4583708ef260fa176eba62858c1efc9e16e9cc21f884b741b845a9b3612cfbf451fb316c764582347011be1ce3374a6a9677f4c0e6bff8147d9df8304b3737a31ba1c71a86c98abf9ca16ff40b2ae4e6649af982750067dd4c485ae99f7f28269bb8fdfa45d5a6b5ed8c878cb19557998166ec1bb3394725bf171967d628f59e25bf1492b39a674eb1af00f325851bdde9c04c6991bf52aa2bdb786b246c5397e80eeb522e91d29beddded83cda7dee1fb150ad7b2085b6d9a2fa67e4e93525283beccb8c2893617ce2ce61d8644f658f8aba085d") r5 = proc_create(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)='^\x00', 0x2, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000680)='/dev/stderr\x00', 0xc, 0x3, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) mkdir(&(0x7f00000006c0)='./file0\x00', 0x8, 0x8) tcgetattr(r4, &(0x7f0000000700)) r6 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) fchdir(r5, r6) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) bash-4.3$ Unhandled user trap in vcore context from VC 2 HW TRAP frame (partial) at 0xffffffffc8e380e0 on core 2 rax 0x000000005a5a4e80 rbx 0x000030000001ce90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x000030000001ce80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x0000000000410050 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa02c80 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fe36 cs 0x------------0023 flag 0x0000000000010202 rsp 0x000030000001cd80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fe36 is in syz-executor at offset 0x000000000000fe36 VM Regions for proc 37 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff8000048e9420, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff8000048e9420, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff8000048e9420, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff8000048e9420, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040fe36 is in syz-executor at offset 0x000000000000fe36 #02 Addr 0x000000000041025e is in syz-executor at offset 0x000000000001025e #03 Addr 0x000000000041580d is in syz-executor at offset 0x000000000001580d #04 Addr 0x00000000004080fb is in syz-executor at offset 0x00000000000080fb #05 Addr 0x0000000000414c60 is in syz-executor at offset 0x0000000000014c60 #06 Addr 0x000000000040862a is in syz-executor at offset 0x000000000000862a #07 Addr 0x0000000000404019 is in syz-executor at offset 0x0000000000004019 20:42:53 executing program 0: r0 = openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r1 = proc_create(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f0000000100)='/net/ether0/1/ifstats\x00', 0x16, 0x0) fchdir(r1, r0) fstat(r0, &(0x7f0000000000)) #08 Addr 0x000000000041498c is in syz-executor at offset 0x000000000001498c #09 Addr 0x0000000000414991 is in syz-executor at offset 0x0000000000014991 20:42:53 executing program 0: openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) r0 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa, 0x1, 0x0) r1 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) r2 = fcntl$F_DUPFD(r1, 0x0, r0, 0x1) openat$dev_kprint(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) fd2path(r2, &(0x7f00000001c0)=""/89, 0x59) r3 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) tcgetattr(r3, &(0x7f0000000400)) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) vmm_poke_guest(0x5) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000600)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000640)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000680)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) 20:42:53 executing program 0: r0 = openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/user\x00', 0x10, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x8400) tcgetattr(r0, &(0x7f0000000080)) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/strace\x00', 0x12, 0x1, 0x0) Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 59(0xffff800002178c00) Core 02, prov: 0(0x0000000000000000) alloc: 56(0xffff80000217aa00) Core 03, prov: 0(0x0000000000000000) alloc: 58(0xffff800002179b00) Which cores are provisioned to which procs: 20:42:54 executing program 3: r0 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) tcgetattr(r0, &(0x7f0000000540)) -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 59(0xffff800002178c00) Core 02, prov: 0(0x0000000000000000) alloc: 56(0xffff80000217aa00) Core 03, prov: 0(0x0000000000000000) alloc: 58(0xffff800002179b00) Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 59(0xffff800002178c00) Core 02, prov: 0(0x0000000000000000) alloc: 56(0xffff80000217aa00) Core 03, prov: 0(0x0000000000000000) alloc: 58(0xffff800002179b00) 20:42:56 executing program 4: openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipselftab\x00', 0xfffffffffffffe64, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/mem\x00', 0xf, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000080)) fcntl$F_GETFD(r0, 0x1) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000140)='/dev/caphash\x00', 0xd, 0x3, 0x0) Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 59(0xffff800002178c00) Core 02, prov: 0(0x0000000000000000) alloc: 60(0xffff800002177d00) Core 03, prov: 0(0x0000000000000000) alloc: 58(0xffff800002179b00) kernel warning at kern/src/printfmt.c:141, from core 3: _x && _x < ULIM Stack Backtrace on Core 3: #01 [<0xffffffffc200a42c>] in backtrace #02 [<0xffffffffc2009c54>] in _warn #03 [<0xffffffffc204904e>] in vprintfmt #04 [<0xffffffffc2049312>] in vsnprintf #05 [<0xffffffffc2058539>] in vset_errstr #06 [<0xffffffffc205866b>] in set_error #07 [<0xffffffffc2039a29>] in cmderror #08 [<0xffffffffc2039b1b>] in lookupcmd #09 [<0xffffffffc206273c>] in igbectl #10 [<0xffffffffc2079479>] in etherwrite #11 [<0xffffffffc2040639>] in rwrite #12 [<0xffffffffc204088b>] in syswrite #13 [<0xffffffffc20593e9>] in sys_write #14 [<0xffffffffc2059f49>] in syscall #15 [<0xffffffffc205aaf8>] in run_local_syscall #16 [<0xffffffffc205b039>] in prep_syscalls #17 [<0xffffffffc20ac812>] in sysenter_callwrapper Unhandled user trap in vcore context from VC 0 Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 02, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 03, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) HW TRAP frame (partial) at 0xffffffffc8e380e0 on core 2 kernel panic at kern/arch/x86/trap.c:318, from core 3: Proc-ful Page Fault in the Kernel at 0x0000000000000014!